必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.175.145.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.175.145.140.			IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:11:10 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
140.145.175.14.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.145.175.14.in-addr.arpa	name = static.vnpt.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.112.244.170 attackspambots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 12:31:13
49.88.112.68 attackspambots
Oct 22 07:30:52 sauna sshd[129010]: Failed password for root from 49.88.112.68 port 28491 ssh2
...
2019-10-22 12:52:57
54.38.94.7 attackbotsspam
Oct 22 06:15:00 SilenceServices sshd[14321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.94.7
Oct 22 06:15:02 SilenceServices sshd[14321]: Failed password for invalid user openbravo from 54.38.94.7 port 38274 ssh2
Oct 22 06:17:42 SilenceServices sshd[15051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.94.7
2019-10-22 12:20:50
151.73.150.210 attackbots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 12:37:22
180.148.151.164 attackbotsspam
UTC: 2019-10-21 port: 23/tcp
2019-10-22 12:46:13
192.42.116.13 attack
Oct 22 05:57:29 rotator sshd\[1903\]: Failed password for root from 192.42.116.13 port 49204 ssh2Oct 22 05:57:31 rotator sshd\[1903\]: Failed password for root from 192.42.116.13 port 49204 ssh2Oct 22 05:57:34 rotator sshd\[1903\]: Failed password for root from 192.42.116.13 port 49204 ssh2Oct 22 05:57:37 rotator sshd\[1903\]: Failed password for root from 192.42.116.13 port 49204 ssh2Oct 22 05:57:40 rotator sshd\[1903\]: Failed password for root from 192.42.116.13 port 49204 ssh2Oct 22 05:57:43 rotator sshd\[1903\]: Failed password for root from 192.42.116.13 port 49204 ssh2
...
2019-10-22 12:38:29
104.244.73.176 attackspambots
Oct 21 17:52:28 server sshd\[17300\]: Failed password for invalid user admin from 104.244.73.176 port 57628 ssh2
Oct 22 07:01:00 server sshd\[15023\]: Invalid user fake from 104.244.73.176
Oct 22 07:01:00 server sshd\[15023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.73.176 
Oct 22 07:01:02 server sshd\[15023\]: Failed password for invalid user fake from 104.244.73.176 port 33388 ssh2
Oct 22 07:01:03 server sshd\[15068\]: Invalid user admin from 104.244.73.176
...
2019-10-22 12:44:52
192.236.160.165 attackbotsspam
2019-10-22T11:16:02.499179enmeeting.mahidol.ac.th sshd\[5351\]: Invalid user ubnt from 192.236.160.165 port 38266
2019-10-22T11:16:02.519707enmeeting.mahidol.ac.th sshd\[5351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-622636.hostwindsdns.com
2019-10-22T11:16:04.850597enmeeting.mahidol.ac.th sshd\[5351\]: Failed password for invalid user ubnt from 192.236.160.165 port 38266 ssh2
...
2019-10-22 12:16:56
185.209.0.2 attack
10/22/2019-05:58:00.451074 185.209.0.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-22 12:26:26
156.96.112.235 attack
UTC: 2019-10-21 port: 443/tcp
2019-10-22 12:32:27
51.83.74.158 attackspam
Oct 22 06:37:50 meumeu sshd[7514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.158 
Oct 22 06:37:52 meumeu sshd[7514]: Failed password for invalid user braxton from 51.83.74.158 port 51636 ssh2
Oct 22 06:41:18 meumeu sshd[8021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.158 
...
2019-10-22 12:54:48
220.132.175.144 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 12:39:48
37.204.69.2 attack
UTC: 2019-10-21 port: 22/tcp
2019-10-22 12:23:40
124.158.160.34 attack
Unauthorised access (Oct 22) SRC=124.158.160.34 LEN=52 TOS=0x10 PREC=0x40 TTL=110 ID=20718 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 14) SRC=124.158.160.34 LEN=52 PREC=0x20 TTL=107 ID=7200 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-22 12:49:40
106.13.52.234 attack
Oct 22 07:29:23 microserver sshd[15101]: Invalid user victor from 106.13.52.234 port 39828
Oct 22 07:29:23 microserver sshd[15101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234
Oct 22 07:29:25 microserver sshd[15101]: Failed password for invalid user victor from 106.13.52.234 port 39828 ssh2
Oct 22 07:38:08 microserver sshd[16401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234  user=root
Oct 22 07:38:11 microserver sshd[16401]: Failed password for root from 106.13.52.234 port 55408 ssh2
Oct 22 07:50:03 microserver sshd[17984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234  user=root
Oct 22 07:50:06 microserver sshd[17984]: Failed password for root from 106.13.52.234 port 50444 ssh2
Oct 22 07:53:55 microserver sshd[18593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234  user=root
Oct 22 07:
2019-10-22 12:33:37

最近上报的IP列表

14.174.73.22 14.174.6.203 14.175.111.234 14.174.8.222
14.175.145.228 14.175.165.198 14.175.162.35 14.175.169.42
14.175.177.80 14.175.177.117 14.175.188.63 14.174.55.227
14.175.233.71 14.175.235.56 14.175.243.240 14.175.236.175
14.175.62.200 14.175.34.47 14.175.3.166 14.175.72.155